

A few years ago I put my position on the Republican party into a relatively pithy saying it’s really easy to remember.
" No Republicans. No excuses. No exceptions."
Feel free to share and steal without attribution.
A few years ago I put my position on the Republican party into a relatively pithy saying it’s really easy to remember.
" No Republicans. No excuses. No exceptions."
Feel free to share and steal without attribution.
Scaling small things up is always a logistics and repeatability issue. Always.
We had.technology to put a capsule of three men on the moon for a week before most humans alive today were born, and yet we haven’t gone back because while both “number of humans” and “length of stay” are fairly simple ideas to scale up, we never had the logistics to create and fuel the one.saturn V launch every other day that a permanent moon base would need.
Heck, the Internet is full of ground breaking improvements that were “buried” by the challenge of scaling up out of a lab.
Update: this is, in fact, hilarious.
If it keeps up my smartwatch may either cure my tinitus or else inflict it upon all those nearby.
That’s… A bold idea which may or may not be hilarious.
If I slam the button at the end do two more random notifications go out?
IBM has never stopped selling mainframes. One of the big reasons why finance transactions are still COBOL is IBM consultants insisting that a centralized mainframe is better than a private cloud.
Things like the MS-PL strike me as Open Source but not Free Software, but I can’t think of a contrary example which is Free Software but not Open Source.
Spoiler alert : it was just a survey of the reported confidence of folk who admitted to using AI.
So, AI users exhibit a reduction in literally the one skill that the AI expects them to actually have?
I should probably go read that link and see if it’s actual degradation or just selection.
I see you understood the point made by the example.
For nuclear weapons specifically, the activation code was supposed to be a command and control measure to prevent unauthorized use. Having it both be an easily remembered code and one widely known made that whole system meaningless theatre.
Are there any real-world examples where encryption backdoors have been successfully used without compromising cybersecurity?
No. Adding a backdoor to cybersecurity is fundamentally introducing a vulnerability that can be exploited by an attacker.
A backdoor in your IT security is like a hidden button to bypass the lock on the impenetrable front door of your impenetrable house. Sure, it makes the police serving a warrant easier, but now there’s a button that anyone can push to bypass your door.
What you will find are instances with no apparent violations. Just like setting all the nuclear weapons to have the exact same easily remembered activation code didn’t actually lead to a nuclear exchange.
Do tbey still mindlessly phone home so MS can censor what you do on your own PC?
Thats not really what happens, unless you’re so toxic that old-twitter would actually ban you.
Bsky has a “nuclear block”, that essentially removes you and the target from even existing on the version of the site each other see. If you’re ok with just talking to folk who are on your side of a “no, shutup” line, like “trans women are women” or “trans is a mental disorder” you’ll be fine.
The issue is that a bunch of folk who abscribe to the second apparently just want to troll the first, so they get blocked by their targets, have no fun, and then complain to reporters still on twitter.
There is no pattern of facts where “Apple gets to collect a tax on any transaction you make on your iPhone” is a good thing